You are on page 1of 11

REVIEW QUESTIONS

POLICE INTELLIGENCE OPERATIONS


=================================================================
INSTRUCTIONS: Select the correct answer in each of the following
questions. Mark only one answer on each item by a putting a
circle corresponding to the letter of your choice.

1. It is any position within the government, police, military,


the occupant of which could bring about by virtue of the position
a material adverse effect to national security.
A. sensitive position B. confidential agent
C. security officer D. intelligence authority

2. This is an investigation of an individual made upon the


basis of written information supplied by him in an official
inquiry.
A. local agency check B. national agency check
C. partial background D. complete background
investigation investigation

3. This is a type of investigation which consists of written


inquiries sent to appropriate local government agencies.
A. local agency check B. national agency check
C. partial background D. complete background
investigation investigation

4. This is much more comprehensive investigation as compared


with National Agency Check (NAC) and Local Agency Check (LAC).
A. local agency check B. background investigation
C. partial background D. complete background
investigation investigation

5. Consist of the investigation on the background of


individual, particularly all the circumstances of his personal
life.
A. local agency check B. national agency check
C. partial background D. complete background
investigation investigation

6. Consist of the investigation of the background of an


individual, but limited only to some of the circumstances of his
personal life.
A. local agency check B. national agency check
C. partial background D. complete background
investigation investigation

7. It is a type of security clearance issued after the conduct


of personnel security investigation that is valid for five years
unless sooner revoked by the issuing authority.
A. interim clearance B. final clearance
C. security clearance D. none of the above
8. These are the purpose of police intelligence activity,
EXCEPT:
A. to reduce error B. to conceal identify
C. to increase accuracy D. to help in decision making

9. It is primarily designed to enable the officer of unit to


achieve and maintain a sound and effective security system.
A. security education B. security orientation
C. security indoctrination D. security reminders

10. This consists of initial briefing on security, its various


aspects, and its importance and it is made to the new personnel
and employees.
A. security education B. security orientation
C. security indoctrination D. security reminders

11. It is the determination of the pertinence or significance of


the information relative to police operations.
A. evaluation B. analysis
C. interpretation D. integration

12. The process of making conclusions from integrated


intelligence and/or information.
A. integration B. assessment
C. evaluation D. deduction

13. It is the graphic representation of the current enemy


situation.
A. intelligence journal B. intelligence files
C. situation map D. intelligence workbook

14. A cautious surveillance, because the loss of the subject is


preferred to possible exposure.
A. close surveillance B. open surveillance
C. loose surveillance D. mustard plaster

15. A surveillance with little or no attempt at concealment, the


subject is most likely aware of the surveillance, but must not be
lost.
A. close surveillance B. open surveillance
C. loose surveillance D. mustard plaster

16. The subject is followed so closely that surveillant and


subject are almost in lock step.
A. close surveillance B. open surveillance
C. loose surveillance D. mustard plaster

17. A form of open surveillance in which the subject’s vehicle


is closely followed.
A. technical surveillance C. tailgaiting
C. directional finder D. protective custody

18. Its functions are to serve as the intelligence and counter-


intelligence operating unit of the Philippine National Police.
A. Intelligence Service, AFP
B. Police Intelligence Group
C. National Intelligence Coordinating Agency
D. Directorate for Intelligence

19. It is a difficult one, in all cases it must be a close one


or the person being followed will be lost.
A. leaf frog method B. one-man method
C. group method D. mixed method

20. It is a close tail, with other members of the squad keeping


contact with those immediately ahead of them.

2
A. leaf frog method B. one-man method
C. group method D. mixed method

21. This is close tail, and is necessary only when discovery is


preferable to losing the subject.
A. leaf frog method B. one-man method
C. group method D. mixed method

22. It is the visual inspection of an area, installation or


building to determine its suitability for operational activities.
A. surveillance B. casing
C. stake out D. mustard plaster

23. It is one of the principal activities of police intelligence


operations, and limited activities on this will usually produce a
limited intelligence product.
A. news clipping B. liaison program
D. de-briefing C. counter-intelligence

24. The intelligence operatives are being asked about his


personal experiences and observations while conducting
intelligence operations.
A. news clipping B. liaison activities
C. de-briefing D. counter-intelligence

25. It is an important method of gathering intelligence data,


and this is an excellent source of highly valuable material, it
is an overt source of information, and usually 80% of the
intelligence input derived from this collection activities.
A. news clipping B. liaison activities
C. de-briefing D. counter-intelligence

26. Those assigned with the mission of obtaining information


within a specific target.
A. penetration informants B. full time informants
C. ordinary informants D. incidental informants

27. Those that is available for counter-intelligence mission at


all times, and who may derive the major part of their income from
their work as informants.
A. penetration informants B. full time informants
C. ordinary informants D. incidental informants

28. Individuals who furnish information with no intention of


repeating his services on a continuing basis.
A. penetration informants
B. full time informants
C. ordinary informants
D. incidental informants
29. A cover that is general in nature and relatively permanently
adopted to explain the presence of the intelligence operatives in
any given area.
A. natural cover B. cover for status
C. living one’s over D. cover for action

30. A cover designed to explain away or allows the undercover


agent in performing a given clandestine activity, and it may be
an extension of cover for status.

3
A. natural cover B. cover for status
C. living one’s over D. cover for action

31. Agent’s must make sure that every public action he takes
must fit his assumed cover, and that a total picture presented to
others accurately reflects his cover.
A. natural cover B. cover for status
C. living one’s over D. cover for action

32. A cover which completely fits the true background and


capabilities of the agent.
A. natural cover B. cover for status
C. living one’s over D. cover for action

33. Using true or actual personal background to fit for the


purpose in the conduct of cover and undercover operations for
purposes of collecting information.
A. multiple cover B. cover within a cover
C. artificial cover D. natural cover

34. A cover using biographical data adopted for the purpose that
is fictitious.
A. multiple cover B. cover within a cover
C. artificial cover D. natural cover

35. It includes provisions for sufficient contact between the


undercover agent, and the target of interest to produce
worthwhile results.
A. continuous contact B. complete background
C. safe departure D. mutual interest

36. The cover story must include the material on all aspects of
the undercover agent’s previous background, regardless of whether
or not it is anticipated that this information will be required.
A. continuous contact B. complete background
C. safe departure D. mutual interest

37. This must exist if an individual is to function as an


informant—most often and the rest of the time, it is provided by,
EXCEPT:
A. motives B. chance
C. propinquity D. proximity

38. The undercover agent is required to develop friendship and


trust with the target personality for the purposes of obtaining
information or evidence.
A. dwelling B. social assignment
C. personal contact D. work assignment
39. It places the undercover agent in a type of employment where
he can observe the activities of the subject at his place of
work.
A. dwelling B. social assignment
C. personal contact D. work assignment

40. It is the process of evaluating the person’s suitability for


a security clearance.
A. security clearance B. background investigation
C. compartmentation D. adjudication process

4
41. This is a form required to an individual who is being
processed for a security clearance.
A. personal data sheet B. bio-data
C. curriculum vitae D. personal hist. statement

42. Those by virtue of their official positions are expected or


obligated to furnish information openly.
A. automatic informants B. casual informants
C. incidental informants D. recruited informants

43. Individuals who by social or professional position, posses


or has access to information of continuing interest.
A. automatic informants B. casual informants
C. incidental informants D. recruited informants

44. This is a continuous and systematic program designed to meet


the security needs of the office or unit.
A. security education
B. security orientation
C. security indoctrination
D. security reminders

45. This is a phase of security education program which makes


use of security posters, slogans, signs and stickers, with the
aim purpose of developing security consciousness from among the
employees and personnel.
A. security education
B. security orientation
C. security indoctrination
D. security reminders

46. This is a motive wherein persons hold belief inimical to


their country, and they are of course vulnerable to the approach
of the subversive groups or enemies.
A. revenge B. material gain
C. personal prestige D. ideological beliefs

47. On of the most powerful of motivations that make people


susceptible to pressure.
A. jealousy B. gullibility
C. weakness of character D. serious indebtedness

48. It is an individual who accept every story at face value and


can see no wrong in anyone, and they fall into this category.
A. jealousy B. gullibility
C. weakness of character D. serious indebtedness
49. Because of this, such a person, approached with the lure of
a large sum of money is very vulnerable, and a definite security
risk.
A. jealousy B. gullibility
C. weakness of character D. serious indebtedness

50. It is someone from the enemy side held as prisoner while the
war is going on.
A. prisoners of war B. enemy intelligence
C. internee D. captives

5
51. It is the product resulting from the collection, evaluation,
analysis, integration, and interpretation of all available
information which is significant to planning.
A. intelligence
B. police intelligence
C. information
D. military intelligence

52. It is an evaluated material of every description including


those derived from observation, reports, rumors, imagery, and
other sources from which intelligence are derived.
A. classified matters
B. classified documents
C. information
D. reports and records

53. These are intelligence data that are not of an immediate


value.
A. line intelligence B. strategic intelligence
C. false intelligence D. counter-intelligence

54. It is the exploitation of sources of information by the


collection agencies, and the delivery of the information obtained
to proper intelligence unit.
A. collection B. processing
C. dissemination D. direction of collection

55. It is a repetitive process used to produce intelligence from


information.
A. intelligence effort B. intelligence activity
C. intelligence work D. intelligence cycle

56. The reliability of the source is “highly reliable” and the


accuracy of information is “confirmed information,” what is the
evaluation rating of the information.
A. A-1 B. B-2
C. C-3 D. D-4

57. He is considered as the father of organized military


espionage.
A. Akbar B. Frederick the Great
C. Genghis Khan D. Alexander the Great

58. It is in this phase of intelligence cycle in which


information becomes intelligence.
A. collection B. processing
C. dissemination D. direction of collection
59. It includes the systematic exploitation of all sources of
information, and it must be methodical, continuous, and carefully
controlled.
A. collection of information
B. dissémination of information
C. processing of information
D. direction of collection effort

60. Are those items of information regarding criminals or


subversives, and that needs to be collected or processed to meet
the intelligence requirements of police executives.

6
A. other information requirements
B. priority intelligence requirements
C. orders and request
D. intelligence indicator

61. It is the timely conveyance of information and or


intelligence in any appropriate form and by any suitable means.
A. collection B. processing
C. dissemination D. direction of collection

62. It is the observation of a person, place or thing, generally


—but not necessarily—in unobtrusive manner.
A. informant operation B. undercover operation
C. surveillance D. intelligence activities

63. Also called as a plant or fixed surveillance, here the


surveillant remains essentially in one position or locale.
A. tail gating B. stakeout
C. convoy D. undercover

64. The term roping described this situation, and it is said to


be planted.
A. undercover B. shadow
C. stakeout D. convoy

65. The subject is kept under constant surveillance, and the aim
is not to lose the subject even at the risk of being made.
A. close surveillance B. loose surveillance
C. open surveillance D. mustard plaster

66. It is a surveillance involving the use of scientific devices


to enhance hearing or seeing the subject’s activities.
A. tailgaiting B. stakeout
C. mustard plaster D. technical surveillance

67. To be detected or suspected of being surveillant by the


subject.
A. be made B. burn out
C. shadow D. convoy

68. It is a device in the tools of recording information which


provides a means of systematic arrangement of information by type
of subject.
A. intelligence journal
B. enemy situation map
C. intelligence workbook
D. order of battle
69. It is not usually a major factor in prompting an individual
to furnish information, but it can be potent at times.
A. gratitude B. civic duty
C. emotions D. mercenary

70. It is an individual who openly or secretly obtained or who


assist in obtaining information for intelligence and counter-
intelligence purposes.
A. informants B. source
C. eye witness D. intelligence asset

7
71. Individuals who are selected, trained, and utilized as
continuous covert sources of information concerning specific
intelligence aspects.
A. casual informant B. recruited informant
C. automatic informant D. incidental informant

72. Individuals who are simultaneously employed by two opposing


intelligence agencies with one are aware of his dual role.
A. dual agents B. double agents
C. informers D. informants

73. It is a means by which individual, groups or organization


conceals the true nature of its activities and existence from
observer.
A. surveillance B. cover assignment
C. intelligence D. undercover assignment

74. It is an individual who provides information because of


purely monetary consideration.
A. informer B. source
C. eye witness D. informant

75. It is an inquiry into the specific phases of an individual


life history, including to a minimum, national agency check,
character reference, and former employers.
A. local agency check
B. national agency check
C. partial background investigation
D. complete background investigation

76. It is an inquiry into the loyalty, integrity, character,


morale, and discretion of an individual because of the sensitive
position he holds, or is about to assume.
A. personnel security investigation
B. complete background investigation
C. partial background investigation
D. national and local agency checks

77. In police operational intelligence, those who do not meet


the requirements of need to know means what?
A. without clearance B. black lists
C. outsiders D. outside elements

78. When a surveillant’s behavior causes the subject to surmise


or know that he or she is under surveillance.
A. be made B. burn the surveillance
C. burn out D. all of the above
79. This letter represent that the source of intelligence
information is from tactical interrogation of captured enemy.
A. U B. V
C. W D. X

80. Information or material in any form, the safeguarding of


which is necessary in the interest of national security.
A. documents B. classified matters
C. security clearance D. vital information

8
81. It is the act of changing the assigned classification of a
document or material.
A. classify B. declassify
C. classification D. compartmentation

82. It is the assigning of an information or material to one of


the four security classifications.
A. classify B. declassify
C. classification D. compartmentation

83. A properly trained and cleared individual who assist the


head of the department in discharging the responsibilities of
safeguarding classified documents and materials.
A. intelligence operatives B. undercover agent
C. security officer C. confidential agents

84. It is the term given to the requirement to those persons


whose official duty requires knowledge of possession thereof.
A. compartmentation B. need-to-know
C. cleared individuals D. security officer

85. It is the granting of access to classified document or


information.
A. compartmentation B. need-to-know
C. cleared individual D. security officer

86. Information and material which requires special protection,


and this not anymore requires cover sheet.
A. restricted B. confidential
C. secret D. top secret

87. Information or material the unauthorized disclosure of which


would cause administrative embarrassment or unwarranted injury.
A. restricted B. confidential
C. secret D. top secret

88. Information or material the unauthorized disclosure of which


would endanger national security and will cause serious injury.
A. restricted B. confidential
C. secret D. top secret

89. Information or material the unauthorized disclosure of which


would cause exceptionally grave damage to the nation,
politically, economically, and from the security standpoint.
A. restricted B. confidential
C. secret D. top secret
90. It is any recorded information regardless of its physical
form or characteristics.
A. classified document B. document
C. information D. material

91. That aspect of police intelligence activities relating to


all security measures, both offensive and defensive intelligence
operations activities.
A. counter-intelligence
B. line intelligence
C. strategic intelligence
D. intelligence

9
92. Counter intelligence measures that seek to conceal
information from enemy.
A. active-offensive B. passive-defensive
C. counter-intelligence D. intelligence

93. Counter intelligence measures that seek to block the enemy’s


effort to engage in espionage, sabotage or subversion.
A. active-offensive B. passive-defensive
C. counter-intelligence D. intelligence

94. It encompasses measures taken by an office or group to


protect itself against espionage, enemy observations, sabotage,
or subversion.
A. police security B. civil security
C. special operation D. censorship

95. It encompasses active and passive counter-intelligence


measures affecting civilians permanently or temporarily residing
in an area under police or military jurisdictions.
A. police security B. civil security
C. special operation D. censorship

96. It is the employment of active-counter intelligence


techniques and procedures in the conduct of clandestine or covert
operations.
A. police security
B. civil security
C. special operation
D. censorship

97. It is the control and examination of communications to


prevent the transmission of information that may fall to the hand
of the enemy.
A. police security
B. civil security
C. special operation
D. censorship

98. It includes all the security measures designed to prevent


unsuitable individuals or persons of doubtful loyalty to be
employed in the government, military or police entities.
A. background investigation
B. personnel security
C. counter-intelligence
D. neighborhood check
99. It is an inquiry into the character, reputation, discretion
and loyalty of an individual.
A. Personnel Security Investigation
B. Complete Background Investigation
C. Partial Background Investigation
D. all the above given answers

100. Individuals who are simultaneously employed by two or more


friendly intelligence collection intelligence agencies, and
usually motivated by economic gains.
A. dual agents B. double agents
C. informers D. informants

10
-END-

11

You might also like